[Panel] Cybersecurity Threat Intelligence: From Noise to Action

To stay ahead of attackers, IT security teams are connecting their sophisticated threat mitigation infrastructure to a wide range of threat intelligence services: their own network data, open-source intel, commercial feeds, and even peers threat intel. Consuming this data is a starting point, but in many cases the volume of information generated is overwhelming. Its increasingly clear that threat intelligence needs to be winnowed down to the essential critical events, and then have context added to those events to reach the ultimate goal: to turn a mountain of threat intelligence into a few meaningful actions.

This webinar covers the challenges associated with working with threat intelligence and the security solutions available to turn data into actions that meaningfully decrease the threat exposure window.

More data doesn’t always equal better prevention. It often feels like there is an arms race underway, with security operations and response professionals in the sights of an escalating amount of alerts and threat data, which can sometimes do more harm than good. You need a new outcome-driven approach to threat intelligence, with a focus on prevention and operationalizing action, versus simply adding more data.

Unit 42, the Palo Alto Networks® threat research team, is putting this new mindset into practice, discovering new malware families, campaigns and adversaries with the AutoFocus threat intelligence service. Join Ryan Olson, Intelligence Director for Unit 42, to see how his team uses AutoFocus to help automate research, hunting and security operations workflows. You will see real applications of threat intelligence, by one of the best teams in the industry, including:

--- How AutoFocus can help you scale detection and prevention efforts without additional, specialized security staff.
--- How to automate security analysis and response workflows with AutoFocus.
--- Real world use-cases from Unit 42’s research efforts.

We continue with our Series of Cyber Defence Today, finishing off the year with a high!

Hosted by leading technology journalist Georgie Barrat, we will be speaking with It Security Experts from all over Europe, showcasing recent Cyber Security events and panel discussions, learning the most up to date information about the current challenges facing the security community.

Correctly assess and protect yourself against modern Nigerian threat actors.

Join threat intelligence analysts Peter Renals and Simon Conant from Unit 42 for a discussion about malware attacks from Nigerian threat actors, dubbed “SilverTerrier.” This group has grown significantly since 2014, from fewer than 100 attacks to a current rate of 5,000–8,000 per month. These attacks are largely victim-agnostic, spanning all major industry verticals and focusing more on businesses than individuals.

You’ll learn about:

- How Nigerian threat actors have successfully employed commodity malware tools with precision, to target many organizations at scale.
- The financial impact of these attacks.
- Techniques utilized to disguise commodity malware, including business email compromise and spoofing, and how to prevent them.

Correctly assess and protect yourself against modern Nigerian threat actors.

Join threat intelligence analysts Peter Renals and Simon Conant from Unit 42 for a discussion about malware attacks from Nigerian threat actors, dubbed “SilverTerrier.” This group has grown significantly since 2014, from fewer than 100 attacks to a current rate of 5,000–8,000 per month. These attacks are largely victim-agnostic, spanning all major industry verticals and focusing more on businesses than individuals.

You’ll learn about:

- How Nigerian threat actors have successfully employed commodity malware tools with precision, to target many organizations at scale.
- The financial impact of these attacks.
- Techniques utilized to disguise commodity malware, including business email compromise and spoofing, and how to prevent them.

Correctly assess and protect yourself against modern Nigerian threat actors.

Join threat intelligence analysts Peter Renals and Simon Conant from Unit 42 for a discussion about malware attacks from Nigerian threat actors, dubbed “SilverTerrier.” This group has grown significantly since 2014, from fewer than 100 attacks to a current rate of 5,000–8,000 per month. These attacks are largely victim-agnostic, spanning all major industry verticals and focusing more on businesses than individuals.

You’ll learn about:

- How Nigerian threat actors have successfully employed commodity malware tools with precision, to target many organizations at scale.
- The financial impact of these attacks.
- Techniques utilized to disguise commodity malware, including business email compromise and spoofing, and how to prevent them.

Targeted attacks — including advanced persistent threats (APTs) — and today’s sophisticated malware threats are one of the biggest challenges facing customer’s as the threats multiply and create unique compromises within their networks. This creates challenges for traditional security technologies to reliably identify these new class of threats. Even when a threat is detected, there is still the issue of slow response times and extended periods of exposure, as administrators typically need to manually coordinate and configure the necessary changes to their security infrastructure.

Please join us as we work together to deliver an advanced visibility, reporting and monitoring solution for intelligent security analysis that addresses this challenge and delivers new tools to quickly identify and analyze this new class of threats. We will show you how this integration insures better threat response time, and how to automate the steps needed to block malicious sources and quarantine compromised devicesyou through how Palo Alto Networks and Splunk.

Key Benefits:
- Advanced security and visibility in the cloud, on premise, or hybrid model
- Accelerated threat response and enhanced threat detection
- Security visualization, monitoring and analysis
- Demo to show you how to identify ransomware and correlate IOC data through the app and use adaptive response to take actions

The rising tide of successful cyberattacks against organizations has made it clear that traditional approaches for defining trust levels, stopping lateral movement and enforcing advanced security controls within a data center are no longer effective. The Zero Trust approach advocated by Forrester provides guiding principles for achieving a robust and secure data center security architectures. However, choice of the security platform, design considerations and effective use of advanced security capabilities play a crucial role in implementing a successful Zero Trust enabled data center.

In this webinar, guest speaker John Kindervag, Vice President and Principal Analyst at Forrester will talk about the steps to achieving a Zero Trust data center.

By understanding the inner workings of exploit kits, you’ll be better equipped to protect your organization from them. Join Scott Simkin from Unit 42 as he breaks down how today’s attackers are automatically exploiting vulnerabilities in common systems.

By understanding the inner workings of exploit kits, you’ll be better equipped to protect your organization from them. Join Scott Simkin from Unit 42 as he breaks down how today’s attackers are automatically exploiting vulnerabilities in common systems.

By understanding the inner workings of exploit kits, you’ll be better equipped to protect your organization from them. Join Scott Simkin from Unit 42 as he breaks down how today’s attackers are automatically exploiting vulnerabilities in common systems.

Attackers are getting more targeted and advanced, deploying unknown exploits and unique malware that current day endpoint security is not equipped to prevent or even detect. Existing approaches simply can’t protect against these attacks because they don’t have known signatures, known strings –and in many cases, no previously known behavior-so they go straight through, resulting in compromised endpoints waiting for detection and remediation to step in, which is too little too late.

Palo Alto Networks Advanced Endpoint Protection is a complete paradigm shift from detection remediation to pure prevention, designed to close the door on these threats, which manage to evade detection by network-based security or take advantage of blind spots, well before any damage can be done.

Join Palo Alto Networks® for a Live Webinar to learn about the breakthrough advanced endpoint technology that redefines endpoint security as we know it

Join us for a live demo and learn how AutoFocus threat intelligence service helps security teams identify and prevent targeted attacks. We will explain the key concepts of AutoFocus and benefits the service provides.

Securing public cloud environments has never been more challenging. Cyberattacks are on the rise, targeting your business-critical data using applications commonly found on every network. Compounding your data security challenge is the lack of application visibility and control features available in existing cloud security offerings.

The VM-Series for AWS addresses these challenges with a complete set of next-generation firewall and advanced threat prevention features that allow you to identify and control your AWS-based applications and protect your data from known and unknown threats.

The adoption of SaaS applications continues to grow at an exponential pace. You do not want to clamp down on these applications because they are valuable tools for many of your employees. However, because the data and usage of these SaaS applications is invisible to IT administrators, they do expose your organization to potentially disastrous security and data theft risks.

Join us for a live webinar where you will learn how your organization can enable safe usage of SaaS applications and:

•Gain visibility and granular, context-based control of SaaS applications.
•Protect corporate data from malicious and inadvertent exposure after it has left the traditional corporate perimeter.
•Protect against new insertion and distribution points for malware.
•Satisfy compliance requirements while still maintaining the benefits of SaaS based application services.

The challenges of SaaS applications are already here whether they are enabled by IT or end users themselves. Find out how to take back control and safely enable their use.

Correctly assess and protect yourself against modern Nigerian threat actors.

Join threat intelligence analysts Peter Renals and Simon Conant from Unit 42 for a discussion about malware attacks from Nigerian threat actors, dubbed “SilverTerrier.” This group has grown significantly since 2014, from fewer than 100 attacks to a current rate of 5,000–8,000 per month. These attacks are largely victim-agnostic, spanning all major industry verticals and focusing more on businesses than individuals.

You’ll learn about:

- How Nigerian threat actors have successfully employed commodity malware tools with precision, to target many organizations at scale.
- The financial impact of these attacks.
- Techniques utilized to disguise commodity malware, including business email compromise and spoofing, and how to prevent them.

They say that hindsight is 20/20 and in recent months, news of data breaches at several SWIFT (Society for Worldwide Interbank Financial Telecommunications) members has seen many reassessing their cybersecurity strategies.

● A review of these attacks and some of the commonalities
● The role of cyber security hygiene, and subsequent recommendations from SWIFT, FS-ISAC (Financial Services Information Sharing and Analysis Center), and US FFIEC (Federal Financial Institutions Examination Council).
● Best practices that may prevent similar cyberattacks on financial institutions from succeeding in the future.

Register today and learn how the confidence and trust can be protected in the increasingly complex digital world in which we live.